positiv-rnscj.glitch.me Open in urlscan Pro
2a04:4e42:400::571  Malicious Activity! Public Scan

Submitted URL: http://www.sniply.biz/VN73KaS
Effective URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Submission: On April 17 via automatic, source openphish — Scanned from US

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 2 HTTP transactions. The main IP is 2a04:4e42:400::571, located in United States and belongs to FASTLY, US. The main domain is positiv-rnscj.glitch.me.
TLS certificate: Issued by Certainly Intermediate R1 on April 11th 2025. Valid for: a month.
This is the only time positiv-rnscj.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: RBC (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 66.33.60.66 16509 (AMAZON-02)
1 2a04:4e42:400... 54113 (FASTLY)
1 195.80.159.133 29152 (DECKNET-A...)
2 3
Apex Domain
Subdomains
Transfer
1 l2.io
l2.io — Cisco Umbrella Rank: 212118
231 B
1 glitch.me
positiv-rnscj.glitch.me
3 MB
1 sniply.biz
www.sniply.biz
378 B
2 3
Domain Requested by
1 l2.io positiv-rnscj.glitch.me
1 positiv-rnscj.glitch.me
1 www.sniply.biz 1 redirects
2 3
Subject Issuer Validity Valid
*.glitch.me
Certainly Intermediate R1
2025-04-11 -
2025-05-11
a month crt.sh
l2.io
R10
2025-03-01 -
2025-05-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Frame ID: 108331B5CB64F53E4D17C0F7353477AF
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

RBC Royal Bank – Secure Sign In

Page URL History Show full URLs

  1. http://www.sniply.biz/VN73KaS HTTP 307
    https://www.sniply.biz/VN73KaS HTTP 308
    https://positiv-rnscj.glitch.me/public/Sbcrbc.html Page URL

Page Statistics

2
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

3486 kB
Transfer

3755 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://www.sniply.biz/VN73KaS HTTP 307
    https://www.sniply.biz/VN73KaS HTTP 308
    https://positiv-rnscj.glitch.me/public/Sbcrbc.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Sbcrbc.html
positiv-rnscj.glitch.me/public/
Redirect Chain
  • http://www.sniply.biz/VN73KaS
  • https://www.sniply.biz/VN73KaS
  • https://positiv-rnscj.glitch.me/public/Sbcrbc.html
3 MB
3 MB
Document
General
Full URL
https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:400::571 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
171bae430a3c76b808e817800cd9ed394dab29d39b91ee5c34c05100dcdcc369

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
3566746
content-type
text/html; charset=utf-8
date
Thu, 17 Apr 2025 14:20:46 GMT
etag
"3be3a8b17c30b0fe16cf123ae3c561bc"
last-modified
Sun, 13 Apr 2025 20:01:14 GMT
server
AmazonS3
via
1.1 varnish
x-amz-id-2
L4bzAkEU27YdlSnQnStngy2t0B2mIwoht2gzgjLSUsmf/05drxHbVt258/GVNJmpecblw6ft85c=
x-amz-request-id
68VBEMC8DJN1Q87D
x-amz-server-side-encryption
AES256
x-amz-version-id
null
x-cache
MISS, MISS
x-cache-hits
0, 0
x-served-by
cache-mad22068-MAD, cache-mad22068-MAD
x-timer
S1744899646.796977,VS0,VE273

Redirect headers

age
0
cache-control
private, no-cache, no-store, max-age=0, must-revalidate
content-type
text/html; charset=utf-8
date
Thu, 17 Apr 2025 14:20:45 GMT
location
https://positiv-rnscj.glitch.me/public/Sbcrbc.html
server
Vercel
strict-transport-security
max-age=63072000
vary
RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Url
x-current-path
/VN73KaS
x-matched-path
/[shortCode]
x-powered-by
Next.js
x-vercel-cache
MISS
x-vercel-id
sfo1::iad1::f8hc4-1744899644975-1b5217ff5959
ip.js
l2.io/
27 B
231 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: positiv-rnscj.glitch.me
URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS Decknet SARL, FR),
Reverse DNS
Software
Apache/2.4.59 (Debian) /
Resource Hash
9e71be466326b4a33af7652c138a3312b06a48330e36ecd40d9e9d4b6721915e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://positiv-rnscj.glitch.me/

Response headers

Keep-Alive
timeout=5, max=100
Content-Length
27
Date
Thu, 17 Apr 2025 14:20:48 GMT
Content-Type
text/html; charset=UTF-8
Server
Apache/2.4.59 (Debian)
Connection
Keep-Alive
truncated
/
441 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
aa78f941fad055ff3ee821a040dc6157a03d30e5e3c1a6e3c6de6269be7a197c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
561 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4a099741603bab19985341e786a58b230d380e046a4b64cffd889944fd0454a8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
760 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f107564e5e4a31791588c91d2fe6a54dbeeec7a8998bde2d131c2a52b9b823a7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
270 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1173f7c561d5791127c2dd03e4228effb2fc2726e1cd73832cb09fbf3db3d3f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/jpeg
truncated
/
355 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b6fd9ddd2c6c9fd1e15d5919547441753cd6b9076e16f77d17b861b78c168832

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: RBC (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader string| userip function| getMachine

0 Cookies

6 Console Messages

Source Level URL
Text
javascript warning URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
recommendation warning URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Message:
[DOM] Found 6 elements with non-unique id #signinNext: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o
recommendation verbose URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "new-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://positiv-rnscj.glitch.me/public/Sbcrbc.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o